[{"title":"( 89 个子文件 145.77MB ) NDSS安全顶会2020.zip","children":[{"title":"2020","children":[{"title":"Encrypted DNS Privacy A Traffic Analysis Perspective.pdf <span style='color:#111;'> 808.86KB </span>","children":null,"spread":false},{"title":"Detecting Proberesistant Proxies.pdf <span style='color:#111;'> 526.61KB </span>","children":null,"spread":false},{"title":"Deceptive Previews A Study of the Link Preview Trustworthiness in Social Platforms.pdf <span style='color:#111;'> 3.83MB </span>","children":null,"spread":false},{"title":"A Practical Approach for Taking Down Avalanche Botnets Under RealWorld Constraints.pdf <span style='color:#111;'> 451.35KB </span>","children":null,"spread":false},{"title":"NoJITsu Locking Down JavaScript Engines.pdf <span style='color:#111;'> 351.89KB </span>","children":null,"spread":false},{"title":"OcuLock Exploring Human Visual System for Authentication in Virtual Reality Headmounted Display.pdf <span style='color:#111;'> 6.06MB </span>","children":null,"spread":false},{"title":"DataDriven Debugging for Functional Side Channels.pdf <span style='color:#111;'> 5.37MB </span>","children":null,"spread":false},{"title":"Unicorn Runtime ProvenanceBased Detector for Advanced Persistent Threats.pdf <span style='color:#111;'> 718.74KB </span>","children":null,"spread":false},{"title":"Poseidon Mitigating Volumetric DDoS Attacks with Programmable Switches.pdf <span style='color:#111;'> 668.93KB </span>","children":null,"spread":false},{"title":"Custos Practical TamperEvident Auditing of Operating Systems Using Trusted Execution.pdf <span style='color:#111;'> 619.84KB </span>","children":null,"spread":false},{"title":"Mind the Portability A Warriors Guide through Realistic Profiled Sidechannel Analysis.pdf <span style='color:#111;'> 3.19MB </span>","children":null,"spread":false},{"title":"Revisiting Leakage Abuse Attacks.pdf <span style='color:#111;'> 782.54KB </span>","children":null,"spread":false},{"title":"Proof of StorageTime Efficiently Checking Continuous Data Availability.pdf <span style='color:#111;'> 801.77KB </span>","children":null,"spread":false},{"title":"Locally Differentially Private Frequency Estimation with Consistency.pdf <span style='color:#111;'> 928.70KB </span>","children":null,"spread":false},{"title":"Heterogeneous Private Information Retrieval.pdf <span style='color:#111;'> 722.75KB </span>","children":null,"spread":false},{"title":"Metamorph Injecting Inaudible Commands into Overtheair Voice Controlled Systems.pdf <span style='color:#111;'> 2.78MB </span>","children":null,"spread":false},{"title":"SODA A Generic Online Detection Framework for Smart Contracts.pdf <span style='color:#111;'> 945.95KB </span>","children":null,"spread":false},{"title":"When Match Fields Do Not Need to Match Buffered Packets Hijacking in SDN.pdf <span style='color:#111;'> 1.18MB </span>","children":null,"spread":false},{"title":"SVLAN Secure Scalable Network Virtualization.pdf <span style='color:#111;'> 1.78MB </span>","children":null,"spread":false},{"title":"Et Tu Alexa When Commodity WiFi Devices Turn into Adversarial Motion Sensors.pdf <span style='color:#111;'> 673.18KB </span>","children":null,"spread":false},{"title":"DefRec Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids CyberPhysical Infrastructures.pdf <span style='color:#111;'> 6.68MB </span>","children":null,"spread":false},{"title":"Metal A MetadataHiding FileSharing System.pdf <span style='color:#111;'> 1.97MB </span>","children":null,"spread":false},{"title":"Decentralized Control A Case Study of Russia.pdf <span style='color:#111;'> 3.30MB </span>","children":null,"spread":false},{"title":"A View from the Cockpit Exploring Pilot Reactions to Attacks on Avionic Systems.pdf <span style='color:#111;'> 2.84MB </span>","children":null,"spread":false},{"title":"DISCO Sidestepping RPKIs Deployment Barriers.pdf <span style='color:#111;'> 554.63KB </span>","children":null,"spread":false},{"title":"CrossOrigin State Inference COSI Attacks Leaking Web Site States through XSLeaks.pdf <span style='color:#111;'> 385.71KB </span>","children":null,"spread":false},{"title":"Strong Authentication without TemperResistant Hardware and Application to Federated Identities.pdf <span style='color:#111;'> 538.43KB </span>","children":null,"spread":false},{"title":"HFL Hybrid Fuzzing on the Linux Kernel.pdf <span style='color:#111;'> 693.55KB </span>","children":null,"spread":false},{"title":"You Are What You Do Hunting Stealthy Malware via Data Provenance Analysis.pdf <span style='color:#111;'> 2.06MB </span>","children":null,"spread":false},{"title":"OmegaLog HighFidelity Attack Investigation via Transparent Multilayer Log Analysis.pdf <span style='color:#111;'> 813.61KB </span>","children":null,"spread":false},{"title":"Trident Efficient PC Framework for Privacy Preserving Machine Learning.pdf <span style='color:#111;'> 596.16KB </span>","children":null,"spread":false},{"title":"ProtectIOn RootofTrust for IO in Compromised Platforms.pdf <span style='color:#111;'> 4.46MB </span>","children":null,"spread":false},{"title":"Towards Plausible Graph Anonymization.pdf <span style='color:#111;'> 582.57KB </span>","children":null,"spread":false},{"title":"The Attack of the Clones Against ProofofAuthority.pdf <span style='color:#111;'> 723.84KB </span>","children":null,"spread":false},{"title":"Learningbased Practical Smartphone Eavesdropping with Builtin Accelerometer.pdf <span style='color:#111;'> 6.42MB </span>","children":null,"spread":false},{"title":"PacketLevel Signatures for Smart Home Devices.pdf <span style='color:#111;'> 794.32KB </span>","children":null,"spread":false},{"title":"Finding Safety in Numbers with Secure Allegation Escrows.pdf <span style='color:#111;'> 620.02KB </span>","children":null,"spread":false},{"title":"Carnus Exploring the Privacy Threats of Browser Extension Fingerprinting.pdf <span style='color:#111;'> 796.03KB </span>","children":null,"spread":false},{"title":"Practical Traffic Analysis Attacks on Secure Messaging Applications.pdf <span style='color:#111;'> 7.20MB </span>","children":null,"spread":false},{"title":"Genotype Extraction and False Relative Attacks Security Risks to ThirdParty Genetic Genealogy Services Beyond Identity Inference.pdf <span style='color:#111;'> 903.77KB </span>","children":null,"spread":false},{"title":"Withdrawing the BGP ReRouting Curtain Understanding the Security Impact of BGP Poisoning through RealWorld Measurements.pdf <span style='color:#111;'> 5.80MB </span>","children":null,"spread":false},{"title":"DeepBinDiff Learning ProgramWide Code Representations for Binary Diffing.pdf <span style='color:#111;'> 1.13MB </span>","children":null,"spread":false},{"title":"UIScope Accurate Instrumentationfree and Visible Attack Investigation for GUI Applications.pdf <span style='color:#111;'> 942.56KB </span>","children":null,"spread":false},{"title":"Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.pdf <span style='color:#111;'> 710.38KB </span>","children":null,"spread":false},{"title":"Melting Pot of Origins Compromising the Intermediary Web Services that Rehost Websites.pdf <span style='color:#111;'> 998.08KB </span>","children":null,"spread":false},{"title":"Automated Discovery of CrossPlane EventBased Vulnerabilities in SoftwareDefined Networking.pdf <span style='color:#111;'> 679.11KB </span>","children":null,"spread":false},{"title":"Bobtail Improved Blockchain Security with LowVariance Mining.pdf <span style='color:#111;'> 690.22KB </span>","children":null,"spread":false},{"title":"CloudLeak LargeScale Deep Learning Models Stealing Through Adversarial Examples.pdf <span style='color:#111;'> 1006.34KB </span>","children":null,"spread":false},{"title":"On Using ApplicationLayer Middlebox Protocols for Peeking Behind NAT Gateways.pdf <span style='color:#111;'> 347.50KB </span>","children":null,"spread":false},{"title":"SymTCP Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.pdf <span style='color:#111;'> 539.82KB </span>","children":null,"spread":false},{"title":"HYPERCUBE HighDimensional Hypervisor Fuzzing.pdf <span style='color:#111;'> 353.48KB </span>","children":null,"spread":false},{"title":"Dynamic Searchable Encryption with Small Client Storage.pdf <span style='color:#111;'> 601.09KB </span>","children":null,"spread":false},{"title":"Prevalence and Impact of LowEntropy Packing Schemes in the Malware Ecosystem.pdf <span style='color:#111;'> 459.75KB </span>","children":null,"spread":false},{"title":"MassBrowser Unblocking the Censored Web for the Masses by the Masses.pdf <span style='color:#111;'> 1.18MB </span>","children":null,"spread":false},{"title":"PostQuantum Authentication in TLS A Performance Study.pdf <span style='color:#111;'> 704.04KB </span>","children":null,"spread":false},{"title":"Broken Metre Attacking Resource Metering in EVM.pdf <span style='color:#111;'> 356.93KB </span>","children":null,"spread":false},{"title":"Snappy Fast Onchain Payments with Practical Collaterals.pdf <span style='color:#111;'> 712.50KB </span>","children":null,"spread":false},{"title":"FUSE Finding File Upload Bugs via Penetration Testing.pdf <span style='color:#111;'> 477.07KB </span>","children":null,"spread":false},{"title":"Designing a Better Browser for Tor with BLAST.pdf <span style='color:#111;'> 395.86KB </span>","children":null,"spread":false},{"title":"Secure Sublinear Time Differentially Private Median Computation.pdf <span style='color:#111;'> 642.29KB </span>","children":null,"spread":false},{"title":"TKPERM Crossplatform Permission Knowledge Transfer to Detect Overprivileged Thirdparty Applications.pdf <span style='color:#111;'> 3.84MB </span>","children":null,"spread":false},{"title":"ConTExT A Generic Approach for Mitigating Spectre.pdf <span style='color:#111;'> 291.29KB </span>","children":null,"spread":false},{"title":"FlowPrint SemiSupervised MobileApp Fingerprinting on Encrypted Network Traffic.pdf <span style='color:#111;'> 942.58KB </span>","children":null,"spread":false},{"title":"Thumbs.db <span style='color:#111;'> 181.00KB </span>","children":null,"spread":false},{"title":"RAI Securing Embedded Systems with Return Address Integrity.pdf <span style='color:#111;'> 1.39MB </span>","children":null,"spread":false},{"title":"Automated CrossPlatform Reverse Engineering of CAN Bus Commands From Mobile Apps.pdf <span style='color:#111;'> 577.59KB </span>","children":null,"spread":false},{"title":"Into the Deep Web Understanding Ecommerce Fraud from Autonomous Chat with Cybercriminals.pdf <span style='color:#111;'> 3.03MB </span>","children":null,"spread":false},{"title":"EASI EdgeBased Sender Identification on ResourceConstrained Platforms for Automotive Networks.pdf <span style='color:#111;'> 461.59KB </span>","children":null,"spread":false},{"title":"ABSynthe Automatic Blackbox Sidechannel Synthesis on Commodity Microarchitectures.pdf <span style='color:#111;'> 963.66KB </span>","children":null,"spread":false},{"title":"Lets Revoke Scalable Global Certificate Revocation.pdf <span style='color:#111;'> 432.54KB </span>","children":null,"spread":false},{"title":"HotFuzz Discovering Algorithmic DenialofService Vulnerabilities Through Guided MicroFuzzing.pdf <span style='color:#111;'> 594.65KB </span>","children":null,"spread":false},{"title":"When Malware is Packin Heat Limits of Machine Learning Classifiers Based on Static Analysis Features.pdf <span style='color:#111;'> 467.34KB </span>","children":null,"spread":false},{"title":"Are You Going to Answer That Measuring User Responses to AntiRobocall Application Indicators.pdf <span style='color:#111;'> 2.17MB </span>","children":null,"spread":false},{"title":"BLAZE Blazing Fast PrivacyPreserving Machine Learning.pdf <span style='color:#111;'> 688.73KB </span>","children":null,"spread":false},{"title":"Adversarial Classification Under Differential Privacy.pdf <span style='color:#111;'> 4.31MB </span>","children":null,"spread":false},{"title":"Not All Coverage Measurements Are Equal Fuzzing by Coverage Accounting for Input Prioritization.pdf <span style='color:#111;'> 1.34MB </span>","children":null,"spread":false},{"title":"Measuring the Deployment of Network Censorship Filters at Global Scale.pdf <span style='color:#111;'> 3.27MB </span>","children":null,"spread":false},{"title":"SPEECHMINER A Framework for Investigating and Measuring Speculative Execution Vulnerabilities.pdf <span style='color:#111;'> 531.51KB </span>","children":null,"spread":false},{"title":"IMPGT IMPersonation Attacks in G NeTworks.pdf <span style='color:#111;'> 543.39KB </span>","children":null,"spread":false},{"title":"On the Resilience of Biometric Authentication Systems against Random Inputs.pdf <span style='color:#111;'> 786.42KB </span>","children":null,"spread":false},{"title":"Complex Security Policy A Longitudinal Analysis of Deployed Content Security Policies.pdf <span style='color:#111;'> 304.26KB </span>","children":null,"spread":false},{"title":"PhantomCache Obfuscating Cache Conflicts with Localized Randomization.pdf <span style='color:#111;'> 743.21KB </span>","children":null,"spread":false},{"title":"Hold the Door Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft.pdf <span style='color:#111;'> 12.93MB </span>","children":null,"spread":false},{"title":"MACAO A MaliciouslySecure and ClientEfficient Active ORAM Framework.pdf <span style='color:#111;'> 592.91KB </span>","children":null,"spread":false},{"title":"Compliance Cautions Investigating Security Issues Associated with US DigitalSecurity Standards.pdf <span style='color:#111;'> 929.64KB </span>","children":null,"spread":false},{"title":"CDN Judo Breaking the CDN DoS Protection with Itself.pdf <span style='color:#111;'> 4.47MB </span>","children":null,"spread":false},{"title":"DESENSITIZATION PrivacyAware and AttackPreserving Crash Report.pdf <span style='color:#111;'> 1.08MB </span>","children":null,"spread":false},{"title":"SurfingAttack Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.pdf <span style='color:#111;'> 2.85MB </span>","children":null,"spread":false},{"title":"BLAG Improving the Accuracy of Blacklists.pdf <span style='color:#111;'> 1.05MB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]